# I am the Watcher. I am your guide through this vast new twtiverse.
# 
# Usage:
#     https://watcher.sour.is/api/plain/users              View list of users and latest twt date.
#     https://watcher.sour.is/api/plain/twt                View all twts.
#     https://watcher.sour.is/api/plain/mentions?uri=:uri  View all mentions for uri.
#     https://watcher.sour.is/api/plain/conv/:hash         View all twts for a conversation subject.
# 
# Options:
#     uri     Filter to show a specific users twts.
#     offset  Start index for quey.
#     limit   Count of items to return (going back in time).
# 
# twt range = 1 20
# self = https://watcher.sour.is/conv/lmypwla
@prologic I think you changed a pod setting so external links would change to /linkVerify. I should be able to stop this with the "Link Verification" option in Settings, right? I even tried clearing cookies and logging back in and the option is definitely disabled for my account but the links are still changed.
@mckinley Talk to @ullarah he is responsible for this πŸ˜… I understand some folks may not like this, even if it's a security feature.

@ullarah Can we have an option to turn it on/off at the pod level too?

And let's make sure users can toggle it off on their accounts prefs (I didn't test it πŸ€¦β€β™‚οΈ)
@mckinley Talk to @ullarah he is responsible for this πŸ˜… I understand some folks may not like this, even if it's a security feature.

@ullarah Can we have an option to turn it on/off at the pod level too?

And let's make sure users can toggle it off on their accounts prefs (I didn't test it πŸ€¦β€β™‚οΈ)
@prologic @ullarah I don't know what is and is not logged by default, but this makes it easy for a pod admin to track what his users click on. I stopped using DuckDuckGo when I learned that they do this.
Here is a regex rule for the Redirector browser extension that bypasses /linkVerify on any domain, not just twtxt.net. False positives are possible but extremely unlikely. https://ttm.sh/iaR.json
@mckinley Hmm okay.

@ullarah When you're done upgrading your Fedora desktop, let's have a discussion about this πŸ˜…

@mckinley Don't worry we take community feedback very seriously πŸ€—
@mckinley Hmm okay.

@ullarah When you're done upgrading your Fedora desktop, let's have a discussion about this πŸ˜…

@mckinley Don't worry we take community feedback very seriously πŸ€—
@mckinley FWIW I actually disable all access logs on my pod. There are none logged.
@mckinley FWIW I actually disable all access logs on my pod. There are none logged.
@prologic I trust you a lot more than the people who run DuckDuckGo. I see where you guys are coming from, I'm just very skeptical of the efficacy of this kind of system. People will get in the habit of clicking the big blue button immediately and then it's just an annoyance, offering no protection whatsoever. Not to mention it's a unique URL for each link that can easily be tracked by a pod admin.
@mckinley Regarding the "efficacy" and the "cognitive burden" and "complacency" that will come, I agree with that actually. Humans are lazy, and some are kind of ignorant too πŸ˜…
@mckinley Regarding the "efficacy" and the "cognitive burden" and "complacency" that will come, I agree with that actually. Humans are lazy, and some are kind of ignorant too πŸ˜…
@mckinley Alrighty! Here we go! πŸ™‚

* I mainly use Yarn.social on a mobile device. So the trust for me to click on a URL somebody has posted is low.
* The link verification allows me to check the link before going to it. This cannot be done on a mobile device.
* There are going to be users who decide to masquerade a link as another unfortunately.
* Are people going to just blindly click approve? Of course they are. This has the same protection as β€œthis link is malicious” but people ignore it.
* Link verification gives the pod and the poderator a bit of insurance from blame of bad links users could potentially post.
* Can poderators use this for their own personal tracking? Sure they can, but it’s saying do you trust them to turn off access logs and do you trust them to not recompile Yarn.social to have malicious purposes?

However!

The plan for this feature is to start the implementation of a user based permitted domain list.

Having link verification as a poderator option is totally doable, and will investigate this.

I will also investigate a way to completely remove the need for /linkVerify if a user, or poderator, has it turned off.

If I’m coming across as argumentative I’m sorry! Just like @prologic stated we listen to the community. We strive to come to a happy medium.

Thank you for your feedback and hopefully these features won’t be a deterrent from using Yarn.social.
@ullarah

> If I’m coming across as argumentative I’m sorry! Just like @prologic stated we listen to the community. We strive to come to a happy medium.

I didn't think you did at all πŸ‘Œ And we do take feedback very seriously πŸ˜‡ That being said, @ullarah's comments and points here are also very valid. If we can come to a compromise, then I think we're fine.

Sadly like everything we've done, it basically means making everything configurable at both the Pod level and User level πŸ˜‚ Bt that's okay! πŸ‘Œ
@ullarah

> If I’m coming across as argumentative I’m sorry! Just like @prologic stated we listen to the community. We strive to come to a happy medium.

I didn't think you did at all πŸ‘Œ And we do take feedback very seriously πŸ˜‡ That being said, @ullarah's comments and points here are also very valid. If we can come to a compromise, then I think we're fine.

Sadly like everything we've done, it basically means making everything configurable at both the Pod level and User level πŸ˜‚ Bt that's okay! πŸ‘Œ
@ullarah I don't think you're being argumentative. I hope I'm not coming off as such either. I didn't consider mobile users, and something like this makes a lot more sense on a device that doesn't just let you hover over the link to see where it goes.
Sure, a pod owner could modify yarnd to track users, but this is has always been a very privacy focused service by default. Privacy focused to the point that it only stores a hash of the user's email address so it's impossible for a pod owner to see it unless the user attempts to recover his account.
@ullarah On the desktop, at least, it seems like there is very little benefit. Anyone concerned with clicking on a malicious link will hover over it and check the bottom corner before clicking. Those who aren't concerned, even though they should be, will just click the big blue button no matter what. At best, it's an annoyance. At worst, it's allowing the pod owner to play Zuckerberg with his users.
@ullarah
> Thank you for your feedback and hopefully these features won’t be a deterrent from using Yarn.social.

You don't need to talk to me like a customer, let's just have a regular conversation. Your words won't make me leave or stay, and it will take more than a link verification prompt to get me to leave. I like Yarn a lot and I believe in the project. :)
@ullarah > Thank you for your feedback and hopefully these features won’t be a deterrent from using Yarn.social.

You don't need to talk to me like a customer, let's just have a regular conversation. Your words won't make me leave or stay, and it will take more than a link verification prompt to get me to leave. I like Yarn a lot and I believe in the project. :)
this is a great example of an open community.